You are on page 1of 7

This paper has been accepted for publication in main track of IEEE International Conference on Communications 2016 (ICC

2016) to be held on 23-27 May 2016 at Kuala Lumpur Malaysia.


This is an author copy

A Trust Model for Data Sharing in Smart Cities

Quyet H. Cao剷‫ ک‬, Imran Khan‫ ڨ‬, Reza Farahbakhsh‫ ک‬, Giyyarpuram Madhusudan剷 ,
Gyu Myoung LeeƬ , Noel Crespi‫ک‬
剷 Orange Labs, France, Email: ¢quyet.caohuu, giyyarpuram.madhusudan ¤ @orange.com
‫ ڨ‬SchneiderElectric Industries SAS, 38TEC, 38050, Grenoble Cedex 9, France, Email: imran@ieee.org
‫ ک‬Institut Mines-Telecom, Telecom SudParis, CNRS UMR 5157, France,
Email: ¢reza.farahbakhsh, noel.crespi¤@it-sudparis.eu
Ƭ Department of Computer Science, Liverpool John Moores University, UK, Email: g.m.lee@ljmu.ac.uk

Abstract—The data generated by the devices and existing To deal with this issue of trust and control, we have proposed
infrastructure in the Internet of Things (IoT) should be a data usage control model to capture the diversity of
shared among applications. However, data sharing in the IoT obligations and constraints that data owners impose on the use
can only reach its full potential when multiple participants of data [4]. However, the architectural support to provide data
contribute their data, for example when people are able to use usage transparency and accountability is still lacking,
their smartphone sensors for this purpose. We believe that
motivating us to develop this type of architecture support
each step, from sensing the data to the actionable knowledge,
requires trust-enabled mechanisms to facilitate data exchange, for stakeholders in the context of shared platforms in smart
such as data perception trust, trustworthy data mining, and cities. The stakeholders themselves can thus participate in
reasoning with trust related policies. The absence of trust the sequence of steps in the mechanism that enhances the
could affect the acceptance of sharing data in smart cities. In transparency and accountability of data usage.
this study, we focus on data usage transparency and
We use the concept of ontologies and introduce the notion
accountability and propose a trust model for data sharing
in smart cities, including system architecture for trust-based of trust ontology, a formal representation of concepts related to
data sharing, data semantic and abstraction models, and a data usage control requirements, to annotate the data generated
mechanism to enhance transparency and accountability for by the devices or resources in smart cities. We have a semantic
data usage. We apply semantic technology and defeasible data model with which to present the number of entities, the
reasoning with trust data usage policies. We built a states of these entities. This leads to increased flexibility in
prototype based on an air pollution monitoring use case and terms of data integration, modeling, and processing compared
utilized it to evaluate the performance of our solution. to our previous data model based on NGSI [6]. This approach
is also aligned with the standardization reported in OneM2M
Keywords—Internet of Things, Smart Cities, Trust-based Data
Sharing, Data Usage Control, Defeasible Reasoning, and Air [7] as it provides the required abstractions.
Pollution Monitoring. Moreover, we provide trust enforcement for shared data
based on the consumers’ requests and policies of data owners,
allowing the IoT shared platform to keep track of data usage
I. I NTRODUCTION history. We then experiment further on a specific use case, using
a logic reasoner [8] to provide tests based on defeasible
Data sharing in the Internet of Things (IoT) [1] in general reasoning. Trust-based Data Usage (TDU) is the name of our
and in the context of smart cities [2] in particular will only reach solution.
its full potential if data can be collected by multiple sources.
One such example is that people are able to share their data The main contributions of this paper are four-fold: (i) A
related to different events by leveraging the sensing ca- multi-layer architecture for TDU - we describe a use case
pabilities of their smartphones. This crowd-sensing is a recent scenario, its background and main functional entities. We
trend [3] and may soon outperform traditional data collection also include a semantic and abstraction discussion for data
methods such as using pre-installed sensors. However, crowd- integration, modeling, and processing; (ii) A mechanism to
sensing may involve privacy issues for device owners. For ex- enhance the transparency and accountability of data usage - all
ample, some of the data collected by smartphones may contain the steps for stakeholders are provided; (iii) A TDU Ontology
sensitive information such as the location data of the owners. In (TDUO), created by extending some related concepts of the data
the context of smart cities, the data may come from a variety of usage conceptual model. We also define trust policies based on
sources, such as institutional actors, equipment manufacturers, defeasible rules and perform trust enforcement; and (iv) We
network operators, infrastructure providers, service providers, implement a prototype as a use case based on the TDU
and end users [4]. These data potentially undergo several architecture to evaluate its performance.
transformations, such as aggregation and composition, before The rest of the paper is organized as follows. Section
reaching their final destination. Another important aspect is II presents a motivating scenario to illustrate the need for
that the IoT data may also be shared for common usage through TDU. Section III presents our proposed system architecture in
linked data sets such as Linked Open Data [5]. Therefore detail and Section IV discusses the semantics and abstraction.
successful, and in some cases meaningful data sharing in smart Section V presents the transparency and accountability mecha-
cities depends on the establishment of trusted relationships nism. Section VI presents our prototype implementation along
among participants. We believe that participants will share their with the results. The related work is discussed in Section VII,
data when they have the ability to control the use of their data.
This paper has been accepted for publication in main track of IEEE International Conference on Communications 2016 (ICC 2016) to be held on 23-27 May 2016 at Kuala Lumpur Malaysia.
This is an author copy

Fig. 1: Motivating Scenario.

and finally Section VIII concludes the paper by highlighting


few lesson learned and some ideas for future work.

II. M OTIVATING S CENARIO


In this section, we describe a use case scenario to illustrate Fig. 2: Proposed TDU Architecture.
the need for TDU. First to complete the proposed scenario
in our previous work [4], it should be noted that without A. Background
considering TDU, the end-user applications will not perform The proposed architecture is based on our previous works
well, as it won’t be able to offer a better experience. in [9], [10], and [4]. The architectures in [9] and [10] deal with
Figure 1 shows the air pollution monitoring scenario use the simultaneous acquisition of data by multiple applications
case in a smart city. and services from deployed sensors. These applications and
services can be traditional as well as semantic-based Wire-
There are multiple stakeholders, such as institutional actors, less Sensor Network (WSN) applications. When required, the
equipment manufacturers, network operators, infrastructure sensor data can be annotated using sensor domain ontology,
providers, service providers, and end users, which have a diver- such as the Semantic Sensor Network (SSN) [11]. However,
sity of obligations and constraints in terms of controlling the all of this data is sent directly to the consumers (platform
use of their data. In the scope of this study, we cover four high- or end-user applications) without allowing the owners of the
level descriptions of the data usage requirements:(i) Spatio- data to enforce certain policies concerning its usage. In other
temporal granularity; (ii) Abstraction/masking of certain in- words, it is assumed that the data is always trusted, which may
formation; and (iii) the Conditions by class of actor/purpose. not be true. For example, issues such as how the same data
The main requirements are explained in the following use case can be shared among multiple end-users by using different
scenario. policies based on their location, time or role (home users, city
administration or law enforcement agency) are not addressed in
1) The data owner (the company that deploys and owns the above-mentioned works. In addition, the two architectures
the pollution monitoring sensors) will have full access to all mentioned above only consider WSNs as the source of data,
the details generated by all the individual pollution monitoring whereas in the broader context of the IoT and smart cities, many
sensors. types of devices, in addition to sensors, provide data to end-
2) For municipal authorities, the data owner is willing to users. In [4] we presented a step-by-step data handling
make the average air pollution index per street available on an mechanism for data owners, data consumers, and an IoT shared
hourly basis. platform. These are our staring points for contributing to the
architecture proposed in this study.
3) Only statistical data will be made available to commer-
cial operators, over a specific zone and on a weekly basis. B. Layers and Functional Entities
Figure 2 shows the architecture designed for the proposed
trust-based data sharing model (TDU). It contains the follow-
III. S YSTEM A RCHITECTURE
ing three layers:
This section presents the proposed system architecture, 1) Infrastructure Layer: This bottom layer contains a va-
beginning with a description of our previous work on which riety of IoT objects that are deployed to send their data
we based our present solution. A detailed description of to different applications. Because of the IoT scenario, we
different layers and functional entities in the architecture is consider that these IoT objects can belong to different do-
then presented. mains, such as smart sensors from the WSN domain, smart
This paper has been accepted for publication in main track of IEEE International Conference on Communications 2016 (ICC 2016) to be held on 23-27 May 2016 at Kuala Lumpur Malaysia.
This is an author copy

street lights/traffic signal poles from smart cities domain, or


home alarm systems/intelligent HVAC systems from a smart
home/building domain. We also consider that some kind of
infrastructure access/control mechanism is used by each of
these domains independently.
2) Platform Layer: The platform layer is the middle layer,
and it consists of the following four functional entities, On-
tology Manager (OM), Policy Manager (PM), Data Manager
(DM), and Application Manager (AM). This contributes to the
advancement of our previous architecture, in which the OM
was used to work with the domain and trust ontologies. Here,
the PM is used to work with trust policies, the DM is used to
work with IoT data or resources from the infrastructure (INF),
and the DM works with IoT applications. The interactions
between these entities are discussed in Section (V-A).
3) Application Layer: The last layer, the application layer,
contains end-user applications (APP) that receives the shared
data from the infrastructure through the platform. We also
consider that in most cases, the APP will receive and consume
the sensor data (sent to it according to a pre-set policy) but
also the data’s owner (OWN) (probably) wants to know the
data’s usage.

IV. S EMANTIC AND A BSTRACTION


This section presents the semantic technologies for data
integration, modeling, and processing in order to apply this Fig. 3: Transparency and Accountability Mechanism.
approach to the IoT data in the proposed TDU architecture.
C. Data processing
A. Data integration We use Semantic web technologies to retrieve IoT data by
In this study, we use semantic technologies to provide data means of SPARQL [15], an SQL-like language that enables
consistency among heterogeneous data set schema. We propose querying an RDF store. It also allows logical reasoning, and so
the Resource Description Framework (RDF) [12] to encode the new information or knowledge can be inferred from existing
IoT data and resources. Note that the RDF allows for the easy assertions and rules. We can re-use existing reasoners (e.g.
integration of multiple vocabularies [13]. Our IoT data and Pellet4 , Jena5 , or SPINDle [8]) for this purpose.
resources are published as Linked Data [5].
V. T RANSPARENCY AND ACCOUNTABILITY
B. Data modeling This section presents the mechanism we developed to
We propose semantic language to model the number of enhance the transparency and accountability of data usage and
entities and the state of those entities for IoT devices or re- illustrate these aspects with sequence diagram. It also includes
sources. This makes it possible to interact with higher-level the trust ontology, trust policy, and reasoning with trust related
entities rather than directly with IoT devices or resources. policies.
Currently, there are numerous efforts to provide ontologies
for various domains. For example, for sensors we have an A. Mechanism
SSN ontology [11] that was developed and proposed at the W3C Figure 3 shows the sequence diagram of the mechanism to
for standardization. Other ontologies include the Smart enhance transparency and accountability for data usage. The
Appliance REFerence(SAREF) ontology developed by TNO1 , sequence here is aligned to the steps of the Figure 2 shown
which covers popular sensors and actuators. Recently, Linked by the numbers in the arrows.
Open Vocabularies for the Internet of Things (LOV4IoT)2
referenced to more than 300 existing ontology-based projects The OM is used to manage the trust ontology mentioned
relevant for the IoT. Introducing abstraction based on a se- in Section (III-B2 and V-B) to provide TDU. This type of
mantic approach is a concept being pushed forward within ontology can be provided by the developer (DEV) at the
several standard defining organizations such as the ETSI M2M platform. Next, trust policies from the data provider, presented
[14], OneM2M [7], and the W3C Web of Things3 . Therefore in Section (III-B2 and V-C), are managed by the PM. In this
it is worthwhile reusing domain knowledge expertise from the study we assume that the owner of the data is the infrastructure
existing ontologies in this architecture. owner (OWN). The policies can be obtained by the platform
using a simple web-based form. For example, the data owner
1 https://www.tno.nl
2 http://www.sensormeasurement.appspot.com/?p=ontologies 4 https://github.com/complexible/pellet
3 http://www.w3.org/WoT/ 5 https://jena.apache.org/
This paper has been accepted for publication in main track of IEEE International Conference on Communications 2016 (ICC 2016) to be held on 23-27 May 2016 at Kuala Lumpur Malaysia.
This is an author copy

5 <!ELEMENT EntityAttributeList(EntityAttribute *)>


6 <!ELEMENT EntityAttribute(Name, Type,
EntitytValue, EntityMetadata+)>
7 <!ELEMENT DomainMetadata(EntityMetadata *)>
8 <!ELEMENT EntityMetadata(Name, Type, Value)>
9 ...
10 ]>
Listing 1: XML DTD Definition of Data Item.
2) Conditions: The condition list contains (optionally) the
following expressions: (i) Temporal Constraints for temporal
granularity, (ii) Spatial Constraints for spatial granularity, (iii)
Fig. 4: The proposed Trust Data Usage Ontology (TDUO). Abstraction Constraints for the masking of certain information,
(iv) Conditions by Actors, and (v) Conditions by Purposes.
can specify that the data from its infrastructure can be shared We formally define conditions by using XML DTD, as shown
with industrial users but not with academic users. This process in Listing 2.
can also be used to specify granularities, such as to share data
from location A with academic users and to share data from 1 <!DOCTYPE TDUO[
location B with industrial users only. Once the data usage policy 2 <!ELEMENT Condition(Temporality*, Spatiality*,
is received, the PM creates and stores the trust policy based on Abstraction*, Actor*, Purpose*)>
3 <!ELEMENT Spatiality(SpatialScope*)>
the specific rules and the trust ontology. The data from the 4 <!ELEMENT Temporality(TemporalScope *)>
INF is then sent to the DM and annotated with the metadata 5 <!ELEMENT Abstraction(AbstractScope*)>
to control its usage and/or to make it more trustworthy. The PM 6 <!ELEMENT Actor(ActorScope*)>
7 <!ELEMENT Purpose(PurposeScope*)>
extracts the specific rules from the related trust policy for the 8 <!ELEMENT TemporalScope(Secondly?, Minutly?,
trust annotation process. Hourly?, Daily?, Weekly?, Monthly?, Yearly?,
Any?)>
Next, the APP sends a data usage query to the platform; 9 <!ELEMENT SpatialScope(Street?, Zone?, Any?)>
the AM entity is responsible for processing the request. First, 10 <!ELEMENT ActorScope(DataOwner?,
MulnicipalAuthority?, ComercicalOperator?)>
it checks for the trust proof with the PM that this query is 11 <!ELEMENT AbstractScope(Aggregation?, Detail?,
provable or not. If the request is provable, the DM filters/pro- Any?)>
vides data according to the rules extracted from the policy 12 <!ELEMENT PurposeScope(CommercialUse?, Any?)>
13 ...
to the AM. Next, the AM is tasked to keep track of the data 14 ]>
usage history from the APP accessing the platform and to send Listing 2: XML DTD Definition of Condition.
them the final data. Using these steps, it is possible to have
a TDU based on the owner-specified policies. The OWN also 3) Operators: This is a set of model operators (i) Obliga-
can request the platform to visualize data usage history, and tion (ii) Forbidden, and (iii) Permission. The formal definition
process the data owner delegation to the APP. created using XML DTD is presented in Listing 3.
1 <!DOCTYPE TDUO[
B. Trust Ontology 2 <!ELEMENT Operator(Obligation?, Forbidden?,
Permission?)>
This subsection presents the trust ontology used to define 3 ...
the trust policy formulated in the next subsection. 4 ]>
The proposed trust ontology is called TDUO which pro- Listing 3: XML DTD Definition of Operator.
vides more concepts related to the previously presented data 4) UsagePolicy: A collection of rules created by defining
usage conceptual model [4]. We define usage policy by using Operators on the individual Condition. Listing 4 formally
modal operators (Obligation, Forbidden, and Permission) on defines the definition of Usage Policy using XML DTD.
the following conditions: (i) class of actors, (ii) constraints
(Spatiality, Temporality, and Abstraction), and (iii) class of 1 <!DOCTYPE TDUO[
purposes. The proposed TDUO is illustrated in Figure 4. 2 <!ELEMENT UsagePolicy(Name,Rule*)>
3 <!ELEMENT Rule(Operator?, Condition?)>
1) Data Items: A Data Item is an individual part of the 4 <!ELEMENT Name(URI?)>
5 ...
Entity Element. The Entity Element is a container used to 6 ]>
exchange information about an entity. It contains the following Listing 4: XML DTD Definition of Usage Policy.
information: (i) an entity ID including the name and the type,
(ii) a list of the entity attributes, (iii) (optionally) the name of C. Trust Policy
an attribute domain that logically groups together a set of entity
attributes, and (iv) (optionally) a list of metadata that apply to The trust policy is used by the stakeholders to define
all the attribute values of the given domain. We formally define the diversity of obligations and constraints that they wish to
a Data Item by using XML DTD, as mentioned in Listing 1. impose on the usage of their data in the context of sharing by
several smart cities actors. We consider that there are many
1 <!DOCTYPE TDUO[ possible stakeholders’ policies depending on the scenarios,
2 <!ELEMENT DataItem(EntityElement)>
3 <!ELEMENT EntityElement(EntityID, sizes of cities, and infrastructures. Since multiple stakeholders
AttributeDomainName?, EntityAttributeList, each provide their trust policies, this may lead to inconsistent
DomainMetadata?)>
4 <!ELEMENT EntityID(Id, Type)>
This paper has been accepted for publication in main track of IEEE International Conference on Communications 2016 (ICC 2016) to be held on 23-27 May 2016 at Kuala Lumpur Malaysia.
This is an author copy

and conflicting policies. To solve the conflicts that will arise


between rules and exceptions, we have applied Defeasible
Logic (DL) [16] to model the policy [4]. In this section, we
describe in detail the trust policies related to our use case
scenarios.
Data owners (DO): have full access to all the details.
This policy is represented with the use of defeasible rules,
as follows:
RDO = ¢r1,d : DO(X ) ിP T emporalScope(X, any),
r2,d : DO(X ) ിP SpatialScope(X, any),
r3,d : DO(X ) ിP AbstractScope(X, any),
r4,d : DO(X ) ിP P urposeScope(X, any)¤G

Municipal authorities (M A): have permission to access the


available average air pollution index (aggregation), e.g. per
street on an hourly basis. This policy is represented with the
use of defeasible rules, as follows:
R M A = ¢r1,m : M A(X ) ിP SpatialScope(X, street),
Fig. 5: Implemented Architecture of the Prototype.
r2,m : M A(X ) ിP T emporalScope(X, hourly),
r3,m : M A(X ) ിP AbstractScope(X, aggregation)¤G A. Implementation Consideration
We developed an air pollution monitoring application
Commercial operators (C O): only statistical data will be (APM) based on the scenario presented in Section II. It is
made available, e.g. over a zone and on a weekly basis. offered as a RESTful web service based on Java Technology.
This policy is represented with the use of defeasible rules, The application was deployed in a cloud-based OPENSHIFT6 ,
as follows: which is a Platform as a Service (PaaS) that allows the
RC O = ¢r1,c : C O(X ) ിP SpatialScope(X, zone), development of SaaS applications without having to maintain
r2,c : C O(X ) ിP T emporalScope(X, weekly), a server. Figure 5 presents our implemented architecture for
the prototype.
r3,c : C O(X ) ിP AbstractScope(X, statistic)¤G
1) Sensors: We simulated two composite sensor devices by
D. Trust Enforcement using DPWS Simulator7 , and CoAP Simulator 8 . These sensors
are used to measure air pollution indexes such as temperature,
For example, we may have a consumer’s request that a humidity, CO2, and VOC (Volatile organic compound) data.
commercial operator (C O) requests all the details of the air
pollution index data over a street on an hourly basis. This 2) Gateways: We used Apache Tomcat9 to deploy a web
request is represented with the use of defeasible rules, as application server for a gateway simulator. It received data
follows: from the sensors.
r : C O(X ), [P ]SpatialScope(X, street), 3) OPDAM Platform: We used Apache Jena Framework10 ,
[P ]T emporalScope(X, hourly), an open source Java Framework for developing semantic
[P ]AbstractionScope(X, detail) technology. We also used SPINdle [8], a logic reasoner that
can be used to compute the consequence of DL theories
ിO C onsumerRequest(X ) in an efficient manner. We built our shared platform, called
OPDAM, including four main components: OM working with
Reasoning with the trust policy, we come to the Air Pollution Domain Ontology and Trust Ontology; PM with
conclusions: ˰∆[O]C onsumerRequest(X ), Trust Policy/Rules; DM with sensor data, data annotation, and
˰∂[O]C onsumerRequest(X ). This means that this trust annotation; and DM with data enforcement and track data
C onsumerRequest is not defeasible provable, and so usage.
the request is refused. If the consumer’s request is defeasible
provable, the related data items will be filtered or aggregated 4) APM Application: The APM is a RESTful service
following the request conditions before returning the results to developed using Restlet11 , a framework for developing REST
the consumer. Every data usage transaction will be recorded web services. The service requests the relevant air pollution data
as a new data item and later reported to the data owners. from the OPDAM platform.
6 https://www.openshift.com/
VI. P ROTOTYPE I MPLEMENTATION AND R ESULTS 7 https://github.com/sonhan/dpwsim
8 https://github.com/caohuuquyet/jhess/tree/master/jUCP
To validate the proposed solution in this study, we imple- 9 http://tomcat.apache.org/
mented a prototype illustrating an air pollution monitoring use 10 https://jena.apache.org/
case and conducted some performance analysis. 11 http://restlet.com/
This paper has been accepted for publication in main track of IEEE International Conference on Communications 2016 (ICC 2016) to be held on 23-27 May 2016 at Kuala Lumpur Malaysia.
This is an author copy

VII. R ELATED W ORK


Several research activities have investigated supporting for
confidence related to data sharing in different domains, such
as Web, Social Networks, Ubiquitous Computing, WSN, and
IoT/Smart Cities. We categorized the different axes of
confidence as follows: (i) Traditional security mechanisms
(Access control, Authorization, Accountability [17], Privacy
[18] [19]); (ii) Precision, Reliability and Trust Issues [20] [21];
(iii) Abstraction and masking of information (for example,
which level of information should be shared) [13]; (iv) Data
Licensing [22]; and (v) Usage control (how data is used
after access to it has been granted [23]) and usage control
mechanisms are well studied and continue to be improved [24].
In this study, we proposed a trusted data usage approach in the
Fig. 6: Trust Enforcement Time. context of a shared platform in smart cities. We did not focus
on security aspects such as confidentiality, access control, or
B. Prototype Setup privacy. In fact, we used the concept of usage control [23] as
a starting point and then the data usage conceptual model [4]
We set up the prototype based on the architecture shown to propose our trust data usage concepts by defining the data
in Figure 5. First, we deployed two virtual sensors developed usage requirements based on spatio-temporal granularity, the
in Section (VI-A1). We also simulated sensors in different abstraction/masking of certain information and conditions by
virtual areas to measure air pollution in those areas. One class of actors or purposes. We then focused our study on the
sensor sent its data to the gateway simulator outlined in Section architecture to ensure data usage transparency and account-
(VI-A2), and then the data was transferred to the platform by ability. To the best of our knowledge, the ideas proposed in
the gateway. Other sensors sent data directly to the platform. this study are novel and different from the previous efforts in
The OPDAM platform developed in Section (VI-A3) and the the literature.
APM service developed in Section (VI-A4), are deployed on
the cloud12 .
VIII. C ONCLUSION AND F UTURE W ORK

C. Preliminary Performance Analysis Trust is the key for sharing IoT data among various
stakeholders. Using a simple scenario for smart cities, we
This part mainly presents the results based on tests for the propose a trust model to harmonize data sharing incorporating
trust enforcement time (TET) in the implemented architecture. policies defined by the data owner. In summary, we have
The goal is to show how much overhead is incurred due to the contributed a novel multi-layer architecture for TDU including
enforcement of data usage control based on the implementation a use case scenario, its background, main functional entities,
configuration in Section VI-B. and semantic and abstraction models. The mechanism for
To evaluate the proposed solution, we performed two transparency and accountability of data usage has provided
experiments and repeated each experiment 50 times. Their as a sequence diagram to the smart cities’ stakeholders. This
confidence interval is 95%. In the first experiment, the server also has proposed a TDUO trust ontology, defined trust policies
was restarted to create new server instance for each trust based on the trust ontology and defeasible rules, and performed
enforcement request. In the second experiment, we used the trust enforcement using defeasible reasoning. We finally have
same instance of server for subsequent trust enforcement implemented a prototype based on the TDU architecture to
requests. Based on that, we measured the TET in delay seconds. evaluate our solution.
Figure We learned several lessons from this study. The first is
6 shows the results of each experiment (with and without new that multiple stakeholders have to be involved in defining
server instance respectively). data sharing policies. In simple scenarios, these are normally
If server is restarted (new server instance is created for each defined by the data producer. However, in the IoT, data is
request) for each trust enforcement request we had average often merged from various sources and it becomes difficult to
delay of over 253ms. If same instance of server is used for determine who owns which data. The second lesson concerns
subsequent trust enforcement requests we have very less delay, the trust ontologies. We found that some effort needs to be
the average time was around 20ms. In most cases we did not expended in defining general and more open trust ontology,
have large delay, hence trust enforcement does not incur much a likely topic for future work. The third lesson is that the
additional delay. defining of trust and data usage policies should have input
from multiple actors. How data from IoT devices in a private
We also tried to use a cloud-based Google App Engine domain (e.g. smart homes) can be utilized and/or provided to
(GAE) but encountered exceptions such as access control interested entities needs to be explored. In some cases giving
exception while invoking the SPINdle logic reasoner. Solving incentives, like tax rebates, will be useful.
these exceptions involves deep understanding of GAE and For the next steps in this work, we will consider its
improve other performance analysis aspects, this is our planned implementation and validation in the real environment using
future work. end-to-end interactions. Another future work item is the
12 http://opdam2-opdam.rhcloud.com/
This paper has been accepted for publication in main track of IEEE International Conference on Communications 2016 (ICC 2016) to be held on 23-27 May 2016 at Kuala Lumpur Malaysia.
This is an author copy

development of an open source rule engine interpreter. This [17] J. Pato, S. Paradesi, I. Jacobi, F. Shih, and S. Wang, “Aintno: Demon-
rule engine can be used on the cloud-based GAE with no stration of Information Accountability on the Web,” in Privacy, Security,
Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference
encountered exceptions and improved performance aspects. on Social Computing (SocialCom), 2011 IEEE Third International
Defeasible logic is a useful technique to check for inconsistent Conference on. IEEE, 2011, pp. 1072–1080.
rules, but we need to explore if there are other solutions available [18] M. Langheinrich, “Privacy by designprinciples of privacy-aware ubiq-
for this purpose. Lastly, we are going to provide a visualization uitous systems,” in Ubicomp 2001: Ubiquitous Computing. Springer,
tool to help users to customize their policies in an interactive 2001, pp. 273–291.
format that allows them to explore the consequences of certain [19] T. Kang and L. Kagal, “Enabling Privacy-Awareness in Social Net-
changes. works,” in AAAI Spring Symposium: Intelligent Information Privacy
Management, 2010.
[20] Z. Yan, P. Zhang, and A. V. Vasilakos, “A Survey on Trust Management
ACKNOW LEDGMENT for Internet of Things,” Journal of Network and Computer Applications,
The research leading to these results was partially funded vol. 42, pp. 120 – 134, 2014.
by the ITEA projects Fuse-IT, SEAS and CAP, and the ICT [21] P. Anantharam, C. Henson, K. Thirunarayan, A. P. Sheth et al., “Trust
model for semantic sensor and social networks: A preliminary report,”
R&D program of Information & Communications Technology in Aerospace and Electronics Conference (NAECON), Proceedings of the
Promotion (IITP) funded by the Korea government (MSIP) IEEE 2010 National. IEEE, 2010, pp. 1–5.
[R0190-15-2027, Development of TII (Trusted Information [22] G. Governatori, A. Rotolo, S. Villata, and F. Gandon, “One License
Infrastructure) S/W Framework for Realizing Trustworthy IoT to Compose Them All,” in The Semantic Web–ISWC 2013. Springer,
Eco-system]. 2013, pp. 151–166.
[23] A. Pretschner and T. Walter, “Negotiation of usage control policies-
R EFERENCES simply the best?” in Availability, Reliability and Security, 2008. ARES
08. Third International Conference on. IEEE, 2008, pp. 1135–1136.
[1] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A Survey,” [24] A. Lazouski, F. Martinelli, and P. Mori, “Usage control in computer
Computer Networks, vol. 54, no. 15, pp. 2787–2805, 2010. security: A survey,” Computer Science Review, vol. 4, no. 2, pp. 81–
[2] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, “Internet 99, 2010.
of things for smart cities,” Internet of Things Journal, IEEE, vol. 1,
no. 1, pp. 22–32, 2014.
[3] “Smart Urban Crowd-Sensing.” [Online]. Available: http://citris-
uc.org/infrastructure/project/smart-urban-crowd-sensing/
[4] Q. H. Cao, G. Madhusudan, R. Farahbakhsh, and N. Crespi, “Usage
Control for Data Handling in Smart Cities,” in IEEE GLOBECOM,
2015.
[5] T. Berners-Lee, “Linked Data,” in International Journal on Semantic
Web and Information Systems. W3C, 2006, vol. 4, no. 2.
[6] “NGSI 9/10 Information Model,” Tech. Rep. [Online]. Available:
http://goo.gl/mv6qFZ
[7] “OneM2M: Study of Abstraction and Semantics Enablements,” Tech.
Rep., 2015. [Online]. Available: http://goo.gl/2w98Y6
[8] H.-P. Lam and G. Governatori, “The making of SPINdle,” in Rule
Interchange and Applications. Springer, 2009, pp. 315–322.
[9] I. Khan, F. Belqasmi, R. Glitho, N. Crespi, M. Morrow, and P. Polakos,
“Wireless sensor network virtualization: early architecture and research
perspectives,” Network, IEEE, vol. 29, no. 3, pp. 104–112, May 2015.
[10] I. Khan, R. Jafrin, F. Errounda, R. Glitho, N. Crespi, M. Morrow, and
P. Polakos, “A data annotation architecture for semantic applications in
virtualized wireless sensor networks,” in Integrated Network Manage-
ment (IM), 2015 IFIP/IEEE International Symposium on, May 2015,
pp. 27–35.
[11] M. Compton, P. Barnaghi, L. Bermudez, R. Garcı́A-Castro, O. Corcho,
S. Cox, J. Graybeal, M. Hauswirth, C. Henson, A. Herzog et al., “The
SSN ontology of the W3C semantic sensor network incubator group,”
Web Semantics: Science, Services and Agents on the World Wide Web,
vol. 17, pp. 25–32, 2012.
[12] “RDF 1.1 Primer,” W3C, W3C Recommendation, 2014. [Online].
Available: http://www.w3.org/TR/rdf11-primer/
[13] S. Speiser, A. Wagner, O. Raabe, and A. Harth, “Web technologies and
privacy policies for the smart grid,” in Industrial Electronics Society,
IECON 2013-39th Annual Conference of the IEEE. IEEE, 2013, pp.
4809–4814.
[14] “ETSI M2M: Study on Semantic support for M2M data,” Tech. Rep.,
2012. [Online]. Available: http://goo.gl/LkYnsD
[15] O. Hartig, C. Bizer, and J. C. Freytag, “Executing SPARQL queries over
the web of linked data,” in The Semantic Web-ISWC, Springer Berlin
Heidelberg. W3C Working Group, 2009, pp. 293–309.
[16] D. Nute, “Handbook of Logic in Artificial Intelligence and Logic
Programming (Vol. 3),” D. M. Gabbay, C. J. Hogger, and J. A.
Robinson, Eds. New York, NY, USA: Oxford University Press, Inc.,
1994, ch. Defeasible Logic, pp. 353–395.

You might also like